Sciweavers

3299 search results - page 533 / 660
» Privacy and Trusted Computing
Sort
View
UIC
2007
Springer
15 years 10 months ago
Towards a Model of Interaction for Mutual Aware Devices and Everyday Artifacts
Abstract. Devices like PDAs, mobile phones and Smartcards can communicate with each other and to exchange information and they should be made mutually aware of each other. For priv...
Sea Ling, Seng Wai Loke, Maria Indrawan
129
Voted
IPPS
2006
IEEE
15 years 10 months ago
Shubac: a searchable P2P network utilizing dynamic paths for client/server anonymity
A general approach to achieve anonymity on P2P networks is to construct an indirect path between client and server for each data transfer. The indirection, together with randomnes...
A. Brodie, Cheng-Zhong Xu, Weisong Shi
GROUP
2005
ACM
15 years 9 months ago
Real-world oriented information sharing using social networks
While users disseminate various information in the open and widely distributed environment of the Semantic Web, determination of who shares access to particular information is at ...
Junichiro Mori, Tatsuhiko Sugiyama, Yutaka Matsuo
130
Voted
SPC
2005
Springer
15 years 9 months ago
Security Issues for Pervasive Personalized Communication Systems
Technological progress allows us to equip any mobile phone with new functionalities, such as storing personalized information about its owner and using the corresponding personal p...
Bertin Klein, Tristan Miller, Sandra Zilles
VLDB
2005
ACM
114views Database» more  VLDB 2005»
15 years 9 months ago
Checking for k-Anonymity Violation by Views
When a private relational table is published using views, secrecy or privacy may be violated. This paper uses a formally-defined notion of k-anonymity to measure disclosure by vi...
Chao Yao, Xiaoyang Sean Wang, Sushil Jajodia